web analytics

Microsoft Patches Zero-Day Exploited by QakBot – Source: www.databreachtoday.com

Rate this post

Source: www.databreachtoday.com – Author: 1

Cybercrime
,
Fraud Management & Cybercrime
,
Governance & Risk Management

Kaspersky Says It Spotted QakBot Operators Exploiting the Flaw in April

David Perera (@daveperera) •
May 14, 2024    

Microsoft Patches Zero-Day Exploited by QakBot
Researchers from Kaspersky say QakBot hackers used a now-patched Windows zero-day. (Image: Shutterstock)

Microsoft issued a patch Tuesday for a Windows zero-day vulnerability that security researchers say operators of the QakBot botnet and other hackers actively exploited.

See Also: OnDemand | CybeRx – How to Automatically Protect Rockwell OT Customers from Today’s Cyber-Attacks

U.S. authorities in August dismantled the botnet, also known as Qbot, and told reporters that it “ceased to operate” as a result of an antimalware campaign dubbed Operation Duck Hunt. Malware analysts within months observed a resurgence – a comeback that other operators of major Trojans have also managed following infrastructure takedowns (see: More Signs of a Qakbot Resurgence).

Researchers from cybersecurity firm Kaspersky said they spotted Qakbot operators in mid-April using the Windows zero-day, tracked as CVE-2024-30051. The elevation of privilege flaw is rated “important” on the CVSS scale. Telemetry suggests that multiple threat actors have exploited it, Kaspersky said. Microsoft said researchers from DBAPPSecurity, Google and Google-owned Mandiant also notified it about the vulnerability.

The flaw resides in the Desktop Window Manager, the function in Microsoft operating systems since Vista that provides an off-screen buffer for each window, the better to render displays and apply effects such as snapping windows.

“These types of bugs are usually combined with a code execution bug to take over a target and are often used by ransomware. Microsoft credits four different groups for reporting the bug, which indicates the attacks are widespread,” said Dustin Childs of the Zero Day Initiative.

Kaspersky researchers found the flaw while researching another one – a patched Windows flaw also located in the Desktop Window Manager. A hunt for malware samples led them to “a curious document uploaded to VirusTotal on April 1” containing a brief description in “very broken English” of the zero-day and how to exploit to gain system privileges.

QakBot was created in 2008 as a banking Trojan, but its operators evolved over the years to become an initial access broker for other cybercriminals. They’ve sold access to criminal gangs, including Russian-speaking ransomware operations.

Microsoft’s latest Patch Tuesday fixes two active zero-days including the flaw exploited by QakBot. The other, tracked as CVE-2024-30040, is also “important” on the CVSS scale. The vulnerability lies in browser engine MSHTML, which renders web pages frequently connected to Internet Explorer. Microsoft maintains the render active in operating systems for compatibility reasons despite Internet Explorer’s long-ago deprecation. A hacker who social-engineers a victim into opening a malicious document would be able to execute arbitrary code by passing OLE mitigations in the Microsoft suite of office applications.

Original Post url: https://www.databreachtoday.com/microsoft-patches-zero-day-exploited-by-qakbot-a-25210

Category & Tags: –

LinkedIn
Twitter
Facebook
WhatsApp
Email

advisor pick´S post

More Latest Published Posts